暂无分享,去创建一个
[1] Donald Firesmith,et al. Common Concepts Underlying Safety, Security, and Survivability Engineering , 2003 .
[2] Frederik D. Wiersema,et al. The Discipline of Market Leaders-Choose your customers , 2015 .
[3] ChungLawrence,et al. From object-oriented to goal-oriented requirements analysis , 1999 .
[4] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[5] Eric Yu,et al. Modelling Trust in the i* Strategic Actors Framework , 2000 .
[6] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[7] Marianne Swanson,et al. Security Self-Assessment Guide for Information Technology Systems , 2001 .
[8] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[9] Steven Furnell. Computer insecurity - risking the system , 2005 .
[10] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[11] Frederik D. Wiersema,et al. Customer intimacy and other value disciplines , 1993 .
[12] John Mylopoulos,et al. Analyzing security requirements as relationships among strategic actors , 2002 .